|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
With the rapid progress in networking and computing technologies, a
wide variety of network-based computing applications have been
developed and deployed on the internet. Flexible and effective
service provisioning for supporting the diverse applications is a
key requirement for the next generation internet. However, the
current internet lacks sufficient capability for meeting this
requirement, mainly due to the ossification caused by tight
coupling between network architecture and infrastructure.
Service-Oriented Architecture (SOA), which has been widely adopted
in cloud computing via the Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS)
paradigms, may be applied in networking to decouple network
architecture and infrastructure; thus offering a promising approach
to addressing some fundamental challenges to the next generation
Internet. In general, such a service-oriented networking paradigm
is referred to as Network-as-a-Service (NaaS). This book presents
the state of the art of the NaaS paradigm, including its concepts,
architecture, key technologies, applications, and development
directions for future network service provisioning. It provides
readers with a comprehensive reference that reflects the most
current technical developments related to NaaS.
This book, edited and authored by world leading experts, gives a
review of the principles, methods and techniques of important and
emerging research topics and technologies in wireless
communications and transmission techniques. The reader will:
Quickly grasp a new area of research Understand the underlying
principles of a topic and its application Ascertain how a topic
relates to other areas and learn of the research issues yet to be
resolved
This book presents Proceedings of the International Conference on
Intelligent Systems and Networks (ICISN 2021), held at Hanoi in
Vietnam. It includes peer-reviewed high-quality articles on
intelligent system and networks. It brings together professionals
and researchers in the area and presents a platform for exchange of
ideas and to foster future collaboration. The topics covered in
this book include-foundations of computer science; computational
intelligence language and speech processing; software engineering
software development methods; wireless communications signal
processing for communications; electronics track IoT and sensor
systems embedded systems; etc.
This book provides an accessible and comprehensive tutorial on the
key enabling technologies for 5G and beyond, covering both the
fundamentals and the state-of-the-art 5G standards. The book begins
with a historical overview of the evolution of cellular
technologies and addresses the questions on why 5G and what is 5G.
Following this, six tutorial chapters describe the fundamental
technology components for 5G and beyond. These include modern
advancements in channel coding, multiple access, massive
multiple-input and multiple-output (MIMO), network densification,
unmanned aerial vehicle enabled cellular networks, and 6G wireless
systems. The second part of this book consists of five chapters
that introduce the basics of 5G New Radio (NR) standards developed
by 3GPP. These include 5G architecture, protocols, and physical
layer aspects. The third part of this book provides an overview of
the key 5G NR evolution directions. These directions include
ultra-reliable low-latency communication (URLLC) enhancements,
operation in unlicensed spectrum, positioning, integrated access
and backhaul, air-to-ground communication, and non-terrestrial
networks with satellite communication.
This book draws inspiration from natural shepherding, whereby a
farmer utilizes sheepdogs to herd sheep, to inspire a scalable and
inherently human friendly approach to swarm control. The book
discusses advanced artificial intelligence (AI) approaches needed
to design smart robotic shepherding agents capable of controlling
biological swarms or robotic swarms of unmanned vehicles. These
smart shepherding agents are described with the techniques
applicable to the control of Unmanned X Vehicles (UxVs) including
air (unmanned aerial vehicles or UAVs), ground (unmanned ground
vehicles or UGVs), underwater (unmanned underwater vehicles or
UUVs), and on the surface of water (unmanned surface vehicles or
USVs). This book proposes how smart 'shepherds' could be designed
and used to guide a swarm of UxVs to achieve a goal while
ameliorating typical communication bandwidth issues that arise in
the control of multi agent systems. The book covers a wide range of
topics ranging from the design of deep reinforcement learning
models for shepherding a swarm, transparency in swarm guidance, and
ontology-guided learning, to the design of smart swarm guidance
methods for shepherding with UGVs and UAVs. The book extends the
discussion to human-swarm teaming by looking into the real-time
analysis of human data during human-swarm interaction, the concept
of trust for human-swarm teaming, and the design of activity
recognition systems for shepherding. Presents a comprehensive look
at human-swarm teaming; Tackles artificial intelligence techniques
for swarm guidance; Provides artificial intelligence techniques for
real-time human performance analysis.
This book aims to gather the insight of leading experts on
corruption and anti-corruption studies working at the scientific
frontier of this phenomenon using the multidisciplinary tools of
data and network science, in order to present current theoretical,
empirical, and operational efforts being performed in order to curb
this problem. The research results strengthen the importance of
evidence-based approaches in the fight against corruption in all
its forms, and foster the discussion about the best ways to convert
the obtained knowledge into public policy. The contributed chapters
provide comprehensive and multidisciplinary approaches to handle
the non-trivial structural and dynamical aspects that characterize
the modern social, economic, political and technological systems
where corruption takes place. This book will serve a broad
multi-disciplinary audience from natural to social scientists,
applied mathematicians, including law and policymakers.
This is a professional level, introductory text on antenna
principles, design, analysis, and measurements. It is especially
suitable for persons who wish to improve their knowledge of antenna
principles, concept design, performance analyses, and measurements.
It is not a cookbook-like catalog for antenna design, nor does its
understanding require a familiarity with electromagnetic theory,
sophisticated mathematics, or complex computer techniques. The 3rd
Edition updates and expands the original text by Lamont Blake,
which was prepared at the undergraduate engineering, science, or
technology level. For providing technical depth at the senior and
graduate university levels, additions to the original book include
a greatly expanded Chapter 7 on Antennas with Special Properties, a
brand new Chapter 8 on Electronically Steered Arrays, and a revised
Chapter 9 on Measurements. Also new to this edition are numerous
appendices to the updated text and a CD-ROM with sample computer
analyses. Reader knowledge assumes familiarity with basic college
physics and mathematics. Computer computations use Mathcad(R)
software, which can be read and used by persons without prior
computer programming knowledge. The book is therefore suitable for
entry-level as well as the more experienced professionals who
desire to expand their understanding of and capabilities for
antenna principles, analyses, measurements, and design.
This book provides conceptual understanding of machine learning
algorithms though supervised, unsupervised, and advanced learning
techniques. The book consists of four parts: foundation, supervised
learning, unsupervised learning, and advanced learning. The first
part provides the fundamental materials, background, and simple
machine learning algorithms, as the preparation for studying
machine learning algorithms. The second and the third parts provide
understanding of the supervised learning algorithms and the
unsupervised learning algorithms as the core parts. The last part
provides advanced machine learning algorithms: ensemble learning,
semi-supervised learning, temporal learning, and reinforced
learning. Provides comprehensive coverage of both learning
algorithms: supervised and unsupervised learning; Outlines the
computation paradigm for solving classification, regression, and
clustering; Features essential techniques for building the a new
generation of machine learning.
This book focuses on the fundamentals of blockchain technology
along with the means and methods of its integration with Internet
of Things (IoT). The book allows the reader to have a deeper
understanding of blockchain technology, IoT and various application
areas wherein both technologies can be implemented. The book serves
the purpose of providing knowledge about the fundamentals of
blockchain and IoT to a common reader along with allowing a
research scholar to identify some futuristic problem areas that
emerge from the convergence of both technologies. Furthermore, the
authors discuss relevant application areas such as smart city,
e-healthcare, smart travel, etc. throughout the course of the book.
The book also talks through a few case studies illustrating the
implementation and benefits of using blockchain and IoT. Provides a
comprehensive view of blockchain technology and its integration
with IoT; Facilitates in having a valuable understanding of various
application areas pertaining to blockchain and IoT; Assists the
reader in exploring new research areas wherein blockchain and IoT
can find their applicability based upon their list of benefits.
To overcome the constraints of 5G for supporting new challenges, 6G
wireless systems must be developed with new and attractive
features. These systems are expected to increase performance and
maximize quality of service several folds more than 5G along with
other exciting features. However, 6G is still in its infancy and
must be explored. The Handbook of Research on Design, Deployment,
Automation, and Testing Strategies for 6G Mobile Core Network
discusses the technological feats used in the new 6G wireless
systems. It discusses the design, automation, and uses for industry
as well as testing strategies. Covering topics such as 6G
architecture, smart healthcare, and wireless communication, this
major reference work is an excellent resource for computer
scientists, engineers, students and professors in higher education,
researchers, and academicians.
This book brings together papers presented at The 2nd International
Conference on Artificial Intelligence in China (ChinaAI) 2020,
which provides a venue to disseminate the latest developments and
to discuss the interactions and links between these
multidisciplinary fields. Spanning topics covering all topics in
artificial intelligence with new development in China, this book is
aimed at undergraduate and graduate students in Electrical
Engineering, Computer Science and Mathematics, researchers and
engineers from academia and industry as well as government
employees (such as NSF, DOD and DOE).
This book presents the proceedings of the 2nd International
Conference on Networks and Advances in Computational Technologies
(NetACT19) which took place on July 23-25, 2019 at Mar Baselios
College of Engineering and Technology in Thiruvananthapuram, India.
The conference was in association with Bowie State University, USA,
Gannon University, USA and Malardalen University, Sweden. Papers
presented were included in technical programs that were part of
five parallel tracks, namely Computer Application, Image
Processing, Network Security, Hardware & Network Systems and
Machine Learning. The proceedings brings together experts from
industry, governments and academia from around the world with vast
experiences in design, engineering and research. Presents the
proceedings of the 2nd International Conference on Networks and
Advances in Computational Technologies (NetACT19); Includes
research in Computer Application, Image Processing, Network
Security, Hardware & Network Systems and Machine Learning;
Provides perspectives from industry, academia and government.
This book equips readers to understand a complex range of
healthcare products that are used to diagnose, monitor, and treat
diseases or medical conditions affecting humans. The first part of
the book presents medical technologies such as medical information
retrieval, tissue engineering techniques, 3D medical imaging,
nanotechnology innovations in medicine, medical wireless sensor
networks, and knowledge mining techniques in medicine. The second
half of the book focuses on healthcare technologies including
prediction hospital readmission risk, modeling e-health framework,
personal Web in healthcare, security issues for medical records,
and personalized services in healthcare. The contributors are
leading world researchers who share their innovations, making this
handbook the definitive resource on these topics. Handbook of
Medical and Healthcare Technologies is intended for a wide audience
including academicians, designers, developers, researchers and
advanced-level students. It is also valuable for business managers,
entrepreneurs, and investors within the medical and healthcare
industries.
This book provides awareness of methods used for functional
encryption in the academic and professional communities. The book
covers functional encryption algorithms and its modern applications
in developing secure systems via entity authentication, message
authentication, software security, cyber security, hardware
security, Internet of Thing (IoT), cloud security, smart card
technology, CAPTCHA, digital signature, and digital watermarking.
This book is organized into fifteen chapters; topics include
foundations of functional encryption, impact of group theory in
cryptosystems, elliptic curve cryptography, XTR algorithm, pairing
based cryptography, NTRU algorithms, ring units, cocks IBE schemes,
Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based
encryption, attribute based Encryption, extensions of IBE and
related primitives, and digital signatures. Explains the latest
functional encryption algorithms in a simple way with examples;
Includes applications of functional encryption in information
security, application security, and network security; Relevant to
academics, research scholars, software developers, etc.
This book presents best selected papers presented at the
International Conference on Emerging Wireless Communication
Technologies and Information Security (EWCIS 2020), held from 8th
& 9th October 2020 at Amity University Jharkhand, Ranchi,
India. The book includes papers in the research area of wireless
communications and intelligent systems, signal and image processing
in engineering applications, data communication and information
security, IoT and cloud computing. The contribution ranges from
scientists, engineers and technologists from academia as well as
from industry.
This book focuses primarily on the nature-inspired approach for
designing smart applications. It includes several implementation
paradigms such as design and path planning of wireless network,
security mechanism and implementation for dynamic as well as static
nodes, learning method of cloud computing, data exploration and
management, data analysis and optimization, decision taking in
conflicting environment, etc. The book fundamentally highlights the
recent research advancements in the field of engineering and
science.
This book focuses on the combination of IoT and data science, in
particular how methods, algorithms, and tools from data science can
effectively support IoT. The authors show how data science
methodologies, techniques and tools, can translate data into
information, enabling the effectiveness and usefulness of new
services offered by IoT stakeholders. The authors posit that if IoT
is indeed the infrastructure of the future, data structure is the
key that can lead to a significant improvement of human life. The
book aims to present innovative IoT applications as well as ongoing
research that exploit modern data science approaches. Readers are
offered issues and challenges in a cross-disciplinary scenario that
involves both IoT and data science fields. The book features
contributions from academics, researchers, and professionals from
both fields.
This book is intended for senior undergraduate and graduate
students as well as practicing engineers who are involved in design
and analysis of radio frequency (RF) circuits. Fully-solved,
tutorial-like examples are used to put into practice major topics
and to understand the underlying principles of the main
sub-circuits required to design an RF transceiver and the whole
communication system. Starting with review of principles in
electromagnetic (EM) transmission and signal propagation, through
detailed practical analysis of RF amplifier, mixer, modulator,
demodulator, and oscillator circuit topologies, as well as basics
of the system communication theory, this book systematically covers
most relevant aspects in a way that is suitable for a single
semester university level course. Readers will benefit from the
author's sharp focus on radio receiver design, demonstrated through
hundreds of fully-solved, realistic examples, as opposed to texts
that cover many aspects of electronics and electromagnetic without
making the required connection to wireless communication circuit
design. Offers readers a complete, self-sufficient tutorial style
textbook; Includes all relevant topics required to study and design
an RF receiver in a consistent, coherent way with appropriate depth
for a one-semester course; Uses hundreds of fully-solved, realistic
examples of radio design technology to demonstrate concepts;
Explains necessary physical/mathematical concepts and their
interrelationship.
|
|